Security Vulnerability Analysis and Forensic Data Research to Attacks on Mobile Stock Trading System in WiBro Network

被引:0
|
作者
Chun, Woo-Sung [1 ]
Park, Dea-Woo [1 ]
机构
[1] Hoseo Grad Sch Venture, Dept IT Applicat Technol, Seoul, South Korea
关键词
WiBro; Vulnerability; Forensic; Hacker Attack; DDoS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A financial transaction is becoming activation, and financial accident is frequently occurring at mobile terminals by a spread of the Ubiquitous Era on the latest date. We execute an attack regarding mobile stocks transactions system from WiBro networks at this paper, and we study a Security Vulnerability Analysis infringement attack accidents. We generate Forensic data use WireShark, and monitoring calls an actual stock trading process in WiBro networks in order to analyze mobile stocks transactions, and analyze, and detect Vulnerability, and analyzing a packet. We ensure a basis of study detect port, and detect Security Vulnerability through analyses aggressive analysis aggressive viral penetration, authentication packet analysis, analysis aggressive a DDoS network, analysis aggressive a terminal mobile WiBro, a HTS program that there was in order to open through the scanning that used NetScan Tools, and analyze, and generate Forensic data, and to be able to be used as to criminal investigation and legal data.
引用
收藏
页码:291 / 298
页数:8
相关论文
共 50 条
  • [1] Vulnerability Analysis of the Grid Data Security Authentication System
    Yang, Seung S.
    Choi, Hongsik
    Joo, Hankyu
    INFORMATION SECURITY JOURNAL, 2010, 19 (04): : 182 - 190
  • [2] Research on the Construction of Network Security Protection System Based on APT Attacks
    Liu, Hai
    2015 SSR INTERNATIONAL CONFERENCE ON SOCIAL SCIENCES AND INFORMATION (SSR-SSI 2015), PT 2, 2015, 11 : 707 - 711
  • [3] iTrade: A Mobile Data-Driven Stock Trading System with Concept Drift Adaptation
    Hu, Yong
    Zhang, Xiangzhou
    Feng, Bin
    Xie, Kang
    Liu, Mei
    INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING, 2015, 11 (01) : 66 - 83
  • [4] An Artificial Neural Network-based Stock Trading System Using Technical Analysis and Big Data Framework
    Sezer, Omer Berat
    Ozbayoglu, A. Murat
    Dogdu, Erdogan
    PROCEEDINGS OF THE SOUTHEAST CONFERENCE ACM SE'17, 2017, : 223 - 226
  • [5] Research on Data Acquisition Model in Network Security System
    Ma Jun
    Yi Zhengjiang
    2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 4, 2010, : 640 - 642
  • [6] Recent Research in Security, Privacy and Forensic Analysis System for Smart Devices
    Shrivastava, Gulshan
    Nhu Nguyen Gia
    Stanciu, Loredana-Mihaela
    Dac-Nhuong Le
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2021, 13 (01) : VI - VIII
  • [7] Research on vulnerability analysis model of security accident system in petrochemical enterprises
    Dong, Mingxin
    Meng, Yifei
    Song, Xiaomiao
    Qin, Chuanrui
    Bai, Mingqi
    Yin, Fabo
    Zhao, Dongfeng
    PROCESS SAFETY PROGRESS, 2022, 41 (01) : 177 - 190
  • [8] Research on Security System of Computer Network Big Data Encryption System
    Yu, Xin
    Li, Yuan
    2023 3RD ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND COMPUTER SCIENCE, ACCTCS, 2023, : 631 - 635
  • [9] Intelligent stock trading system based on improved technical analysis and Echo State Network
    Lin, Xiaowei
    Yang, Zehong
    Song, Yixu
    EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (09) : 11347 - 11354
  • [10] A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data
    Lin, Weiwei
    Yang, Chaofan
    Zhang, Zeqing
    Xue, Xingsi
    Haga, Reiko
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (12): : 4531 - 4544